NetAdapter Repair All In One is an administrative utility tool. It can be used to set the common network or to troubleshoot winsock. It also contains a variety of tools and diagnostics that allow you to modify various parameters of the network. It requires the installation of. NET Framework 4.0 or higher and must be run as administrator. Author : Conner Bernhard System : Windows XP/Vista/7/8/10
Speccy is a software which provides information about the hardware installed in your computer. It is primarily the motherboard, graphics card, CPU, RAM memory and disk drives. These elements are interesting to know if you want to change its configuration for a possible optimization. This information can be provided to forums disinfection wizards when you solicit their help. Author : Piriform Ltd. Editor : Piriform Ltd. System : Windows XP/Vista/7/8/10
GMER is a software that can delete type rootkit infections. These malwares are implanted into the computer system and are very difficult a detect and repair. At end of research and expertise, it allows to search the areas hidden in your system. The use of this very powerful software must be done with the assistance of an expert in disinfection. Editor : gmer.net Système : Windows XP/Vista/7/8/10 Tutoriel : SOSvirus
This free tool allows helpers or persons with an infected computer to find very easily, grouped in one place, most commonly used disinfection, optimization and diagnostic tools. LoadTool is constantly evolving, tools are added frequently. Currently, LoadTool includes more than 50 different tools sorted by category. official publisher's site more info
ZHP (ZebHelpProcess) is a diagnostic report analysis software ZHPDiag. Each line is classified in a category and a logo allows a faster identification. There is a Helper version reserved for graduate members of security groups and security experts. Compatible with Windowx XP, Vista, Windows 7, Windows 8, Windows 10.
ZHPDiag is a software that allows to perform quick and complete operating system diagnosis. It scrutinizes the Base of registers and lists the sensitive areas that are likely to be pirated. It is based on a whitelist by module system that allows for shorter reports. It detects a large number of malware. It serves as monitor for the most common infections. At the end of report, a list of detection returns to profiles of the malware. […]